Journal: IJICS

Volume 26, Issue 4

291 -- 315K. Kanagalakshmi, Joycy K. Antony. An effective approach for fingerprint template protection based on CiKX transform and Tanimoto similarity measure
316 -- 331Vinay Kumar, Abhishek Vaish. Optimising the detection of metamorphic malwares using ensemble learning technique
332 -- 371Anwesha Kashyap, Angshuman Jana. A survey: on detection and prevention techniques of SQL injection attacks
372 -- 393Keshuo Sun, Haiying Gao, Chao Ma 0016, Bin Hu 0011, Xiufeng Zhao. HP-CP-ABE scheme against collusion attacks under an attribute-key security model
394 -- 421K. Jane Nithya, K. Shyamala. Entropy dragonfly optimisation-based cluster head selection and deep learning clone node detection for wireless sensor network

Volume 26, Issue 3

179 -- 203Sandeep Kumar, Ritu Garg. A collision proof energy efficient lightweight hybrid cryptosystem for fog
204 -- 235Umesh Kumar, V. Ch. Venkaiah. An efficient block cipher based on multiple optimal quasigroups
236 -- 254Vanlalhruaia Chhakchhuak, Ajoy Kumar Khan, Amit Kumar Roy. Common key multi-hop packet authentication protocol for wireless mesh networks
255 -- 271R. Geetha, G. Belshia Jebamalar, B. G. Darshan Vignesh, E. Kamalanaban, Srinath Doss. An efficient cyberbullying detection framework on social media platforms using a hybrid deep learning model
272 -- 290Salheddine Kabou, Laid Gasmi, Abdelbaset Kabou, Sidi Mohamed Benslimane. A new bottom-up l-diversity method for Apache spark

Volume 26, Issue 1/2

1 -- 21Mahesh Patil, Shailaja C. Patil. A blended approach of static binary mining and exploratory data analysis to obtain the security posture of embedded systems firmware
22 -- 40Zeng Shou, Yue-bin Di, Xiao Ma, Rui-chao Xu, Heqiu Chai, Long Yin. The APT family classification system based on APT call sequences and attention mechanism
41 -- 67Miao He, Nurmamat Helil. A lattice-based CP-ABE scheme with immediate attribute revocation
68 -- 90Moumita Sahoo, Sabyasachi Samanta, Soumen Ghosh. An ensemble classification model for improved performance of phishing detection system
91 -- 108Junjing Zhu, HongGang Lin. Method for botnet detection with small labelled samples based on graph neural network
109 -- 146Xian Guo, Kai Zheng, Yongbo Jiang, Jing Wang, Junli Fang 0001. Security-enhanced machine learning framework based on PATE
147 -- 158Orkhan Valikhanli. Detection of malware in ground control stations of unmanned aerial vehicles based on image processing
159 -- 177Nabila Sehito, Shouyi Yang, Raja Sohail Ahmed Larik, Ghulam Raza, Safi Ullah. Analysis of outage probability and optimising secrecy capacity in physical layer security based on wireless cooperative relay networks